STIGQter STIGQter: STIG Summary: Red Hat Enterprise Linux 8 Security Technical Implementation Guide Version: 1 Release: 2 Benchmark Date: 23 Apr 2021:

All RHEL 8 public directories must be owned by root or a system account to prevent unauthorized and unintended information transferred via shared system resources.

DISA Rule

SV-230242r627750_rule

Vulnerability Number

V-230242

Group Title

SRG-OS-000138-GPOS-00069

Rule Version

RHEL-08-010180

Severity

CAT II

CCI(s)

Weight

10

Fix Recommendation

Configure all public directories to be owned by root or a system account to prevent unauthorized and unintended information transferred via shared system resources.

Set the owner of all public directories as root or a system account using the command, replace "[Public Directory]" with any directory path not owned by root or a system account:

$ sudo chown root [Public Directory]

Check Contents

Check to see that all public directories are owned by root or a system account with the following command:

$ sudo find / -type d -perm -0002 -exec ls -lLd {} \;

drwxrwxrwxt 7 root root 4096 Jul 26 11:19 /tmp

If any of the returned directories are not owned by root or a system account, this is a finding.

Vulnerability Number

V-230242

Documentable

False

Rule Version

RHEL-08-010180

Severity Override Guidance

Check to see that all public directories are owned by root or a system account with the following command:

$ sudo find / -type d -perm -0002 -exec ls -lLd {} \;

drwxrwxrwxt 7 root root 4096 Jul 26 11:19 /tmp

If any of the returned directories are not owned by root or a system account, this is a finding.

Check Content Reference

M

Target Key

2921

Comments